Credential Dumping Part 2: How to Mitigate Windows Credential Stealing